During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Openssl | Openssl | 1.0.2 (including) | 1.0.2o (including) |
| Openssl | Openssl | 1.1.0 (including) | 1.1.0h (including) |
| JBoss Core Services Apache HTTP Server 2.4.29 SP2 | RedHat | openssl | * |
| JBoss Core Services Apache HTTP Server 2.4.29 SP2 | RedHat | * | |
| JBoss Core Services on RHEL 6 | RedHat | jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el6 | * |
| JBoss Core Services on RHEL 6 | RedHat | jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el6 | * |
| JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-httpd-0:2.4.29-40.jbcs.el7 | * |
| JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-openssl-1:1.0.2n-15.jbcs.el7 | * |
| Red Hat Enterprise Linux 7 | RedHat | openssl-1:1.0.2k-16.el7 | * |
| Red Hat OpenShift Application Runtimes Node.js 10 | RedHat | rhoar-nodejs-1:10.9.0-1.el7 | * |
| Red Hat OpenShift Application Runtimes Node.js 8 | RedHat | rhoar-nodejs-1:8.11.4-2.el7 | * |
| Openssl | Ubuntu | artful | * |
| Openssl | Ubuntu | bionic | * |
| Openssl | Ubuntu | cosmic | * |
| Openssl | Ubuntu | devel | * |
| Openssl | Ubuntu | disco | * |
| Openssl | Ubuntu | esm-infra-legacy/trusty | * |
| Openssl | Ubuntu | esm-infra/bionic | * |
| Openssl | Ubuntu | esm-infra/xenial | * |
| Openssl | Ubuntu | trusty | * |
| Openssl | Ubuntu | trusty/esm | * |
| Openssl | Ubuntu | xenial | * |
| Openssl098 | Ubuntu | trusty | * |
| Openssl1.0 | Ubuntu | bionic | * |
| Openssl1.0 | Ubuntu | cosmic | * |
| Openssl1.0 | Ubuntu | esm-infra/bionic | * |